Key features and benefits
security that covers all vulnerabilities:
...and many other scenarios covering all possible access or configuration in Office 365
IDECSI only requires non-privileged access to your Office 365.
It does not require access to data or the ability to configure the environment.
IDECSI only requires a service account, restricted to receiving to config and access logs.
It takes less than 15 minutes of IT time to set up IDECSI protection. It is then immediately operational.